General

  • Target

    0a14cb86e67e05db73b95614a3267bee6749dbf590a3770a64c3a3b2a127f3e4

  • Size

    36KB

  • Sample

    220212-lebvfsafa3

  • MD5

    c1308f13be2f8a0438b154ebf6acdd32

  • SHA1

    619635941243f86d2c22049edf59fc966c8439d4

  • SHA256

    0a14cb86e67e05db73b95614a3267bee6749dbf590a3770a64c3a3b2a127f3e4

  • SHA512

    1efa243e33b2bc0323d40b724f26cceed4f891c06899653ad875f35cf077f3509985ade4bb3e1ed675ea1d552a58b40537391fb95e5ac09e1b51615460524623

Malware Config

Targets

    • Target

      0a14cb86e67e05db73b95614a3267bee6749dbf590a3770a64c3a3b2a127f3e4

    • Size

      36KB

    • MD5

      c1308f13be2f8a0438b154ebf6acdd32

    • SHA1

      619635941243f86d2c22049edf59fc966c8439d4

    • SHA256

      0a14cb86e67e05db73b95614a3267bee6749dbf590a3770a64c3a3b2a127f3e4

    • SHA512

      1efa243e33b2bc0323d40b724f26cceed4f891c06899653ad875f35cf077f3509985ade4bb3e1ed675ea1d552a58b40537391fb95e5ac09e1b51615460524623

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks